An Enhanced Approach of Access Control Method in a Distributed Environment
|
International Journal of P2P Network Trends and Technology (IJPTT) | |
© 2018 by IJPTT Journal | ||
Volume-8 Issue-5 |
||
Year of Publication : 2018 | ||
Authors : Abdullah Shakoor, Ali Raza |
Citation
MLA Style: Abdullah Shakoor, Ali Raza "An Enhanced Approach of Access Control Method in a Distributed Environment" International Journal of P2P Network Trends and Technology 8.5 (2018): 6-8.
APA Style:Abdullah Shakoor, Ali Raza, (2018). An Enhanced Approach of Access Control Method in a Distributed Environment. International Journal of P2P Network Trends and Technology, 8(5), 6-8.
Abstract
The purpose of this research is to enhance access control method in a distributed environment. An analysis was discussed among different access control methods. Data on a distributed link is at high risk now days. It should be secured from both internal and external attacks. An unauthorized access towards a data may harm the privacy and policies of an organization. So, it is necessary to secure the database from unauthorized access in a distributed environment. Different Access control techniques were used to secure the database from an intruder. With the growth of internet distributed databases are being used a growing number of rate. It is very important to control the access mechanism in a distributed data-base. Distributed database is distributed physically in a variety of web sites and is integrated logically together. To access the data different privileges are granted to make sure that your data is secure from an unauthorized access as well as from bad use. An approach that works efficiently was preferred by comparing all approaches. In this regard major focus was on privilege of data authorization
References
[1] Fan, Y., Z. Han, J. Liu and Y., Zhao. 2009. A mandatory access control model with enhanced flexibility. In 2009 International Conference on Multimedia Information Networking and Security. 1: 120-124.
[2] Gorla, D. and R. Pugliese. 2009. Dynamic management of capabilities in a network aware coordination language. The Journal of Logic and Algebraic Programming. 78(8): 665-689.
[3] Msahli, M., R. Abdeljaoued and A. Serhrouchni. 2013. Access control in probative value cloud. In Internet Technology and Secured Transactions (ICITST), 2013 8th International Conference for 607-611.
[4] Bacon, J., K. Moody and W. Yao. 2002. A model of OASIS role-based access control and its support for active security. ACM Transactions on Information and System Security (TISSEC), 5(4): 492-540.
[5] Bellavista, P., A. Corradi, R. Montanari and C. Stefanelli. 2003. Dynamic binding in mobile applications. IEEE Internet Computing. 7(2): 34-42.
[6] Cuppens, F. and A. Miège. 2003. Modelling contexts in the Or-BAC model. In Computer Security Applications Conference, 2003. Proceedings. 19th Annual.416-425.
Keywords
Access Control; Authorization; Distributed Environment